Follow
Yonglin Hao
Yonglin Hao
State Key Laboratory of Cryptology
Verified email at sklc.org
Title
Cited by
Cited by
Year
Cube attacks on non-blackbox polynomials based on division property
Y Todo, T Isobe, Y Hao, W Meier
IEEE Transactions on Computers 67 (12), 1720-1736, 2018
1112018
Improved division property based cube attacks exploiting algebraic properties of superpoly
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Annual Cryptology Conference 2018 - CRYPTO 2018 1, 275-305, 2018
682018
Modeling for three-subset division property without unknown subset
Y Hao, G Leander, W Meier, Y Todo, Q Wang
Annual International Conference on the Theory and Applications of …, 2020
462020
Stream cipher designs: a review
L Jiao, Y Hao, D Feng
Science China Information Sciences 63 (3), 1-25, 2020
272020
A meet-in-the-middle attack on round-reduced mCrypton using the differential enumeration technique
Y Hao, D Bai, L Li
International Conference on Network and System Security, 166-183, 2015
172015
A related-key chosen-IV distinguishing attack on full Sprout stream cipher
Y Hao
Cryptology ePrint Archive, 2015
172015
The boomerang attacks on BLAKE and BLAKE2
Y Hao
International Conference on Information Security and Cryptology, 286-310, 2014
162014
A guess-and-determine attack on SNOW-V stream cipher
L Jiao, Y Li, Y Hao
The Computer Journal 63 (12), 1789-1812, 2020
152020
Observations on the dynamic cube attack of 855-round TRIVIUM from Crypto'18
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
Cryptology ePrint Archive, 2018
122018
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
H Yu, Y Hao, D Bai
Science China Information Sciences 59 (5), 1-14, 2016
102016
Links between division property and other cube attack variants
Y Hao, L Jiao, C Li, W Meier, Y Todo, Q Wang
IACR Transactions on Symmetric Cryptology 2020 (1), 363-395, 2020
82020
Cube attacks on non-blackbox polynomials based on division property (full version)
Y Todo, T Isobe, Y Hao, W Meier
Cryptology ePrint Archive, 2017
72017
Improved division property based cube attacks exploiting algebraic properties of superpoly (full version)
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Cryptology ePrint Archive, 2017
62017
Improved division property based cube attacks exploiting algebraic properties of superpoly
Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang
IEEE Transactions on Computers 68 (10), 1470-1486, 2019
42019
A Refinement of``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
X Fu, X Wang, X Dong, W Meier, Y Hao, B Zhao
Cryptology ePrint Archive, 2018
4*2018
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
L Grassi, Y Hao, C Rechberger, M Schofnegger, R Walch, Q Wang
Cryptology ePrint Archive, 2022
32022
Truncated differential based known-key attacks on round-reduced SIMON
Y Hao, W Meier
Designs, Codes and Cryptography 83 (2), 467-492, 2017
32017
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1
M Wang, Y Hao
International Conference on Information Security and Cryptology, 191-211, 2021
22021
Improved guess‐and‐determine attack on TRIVIUM
L Jiao, Y Hao, Y Li
IET Information Security 13 (5), 411-419, 2019
22019
Guess‐and‐determine attacks on PANAMA‐like stream ciphers
L Jiao, Y Li, Y Hao
IET Information Security 12 (6), 484-497, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20